-
1
-
-
4344668573
-
Overview of sensor networks
-
D. Culler, D. Estrin, and M.B. Srivastava, "Overview of sensor networks," In Proc. of IEEE Computer Society, vol. 37, no. 8, pp. 41-49, 2004.
-
(2004)
Proc. of IEEE Computer Society
, vol.37
, Issue.8
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.B.3
-
2
-
-
34247384273
-
Enabling sustainable and scalable outdoor wireless sensor network deployments
-
P. Dutta, J. Hui, J. Jeong, S. Kim, C. Sharp, J. Taneja, G. Tolle, K. Whitehouse, and D.E. Culler, "Enabling sustainable and scalable outdoor wireless sensor network deployments," In Proc. of the 5th International Conference on Information Processing in Sensor Networks, pp. 407-415, 2006.
-
(2006)
Proc. of the 5th International Conference on Information Processing in Sensor Networks
, pp. 407-415
-
-
Dutta, P.1
Hui, J.2
Jeong, J.3
Kim, S.4
Sharp, C.5
Taneja, J.6
Tolle, G.7
Whitehouse, K.8
Culler, D.E.9
-
3
-
-
0036688074
-
A survey on sensor networks
-
Aug
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, Aug. 2002.
-
(2002)
IEEE Communications Magazine
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," In Proc. of 3rd IEEE International Conference on Pervasive Computing and Communications, pp. 324-328, 2005.
-
(2005)
Proc. of 3rd IEEE International Conference on Pervasive Computing and Communications
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
5
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
R.J. Watro, D. Kong, S. Cuti, C. Gardiner,C. Lynn, and P. Kruus, "Tinypk: securing sensor networks with public key technology," In Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59-64, 2004.
-
(2004)
Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 59-64
-
-
Watro, R.J.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
6
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
D.J. Malan, M. Welsh, and M.D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," In Proc. of 1st IEEE International Conference on Sensor and Ad Hoc Comm. and Networks, pp. 71-80, 2004.
-
(2004)
Proc. of 1st IEEE International Conference on Sensor and Ad Hoc Comm. and Networks
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
8
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
W. Du, R. Wang, and P. Ning, "An efficient scheme for authenticating public keys in sensor networks," In Proc. of ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 58-67, 2005.
-
(2005)
Proc. of ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 58-67
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
9
-
-
38049001918
-
Secret key revocation in sensor networks
-
Y. Maeng, A. Mohaisen, and D. Nyang, "Secret key revocation in sensor networks," In Proc. of 4th International Conference of Ubiquitous Intelligence and Computing, pp. 1222-1232, 2007.
-
(2007)
Proc. of 4th International Conference of Ubiquitous Intelligence and Computing
, pp. 1222-1232
-
-
Maeng, Y.1
Mohaisen, A.2
Nyang, D.3
-
11
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D.X. Song, "Random key predistribution schemes for sensor networks," In Proc. of IEEE Symposium on Security and Privacy, pp. 197, 2003.
-
(2003)
Proc. of IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
12
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, "Spins: Security protocols for sensor networks," Wireless Networks, vol. 8, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
14
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
May
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," Journal of ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228-258, May, 2005.
-
(2005)
Journal of ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
16
-
-
38549154412
-
On the grid based key pre-distribution: Toward a better connectivity in wireless sensor networks
-
A. Mohaisen, Y. Maeng, and D. Nyang, "On the grid based key pre-distribution: Toward a better connectivity in wireless sensor networks," In Proc. of International Workshop on Service, Security and its Data management for Ubiquitous Computing, pp. 527-537, 2007.
-
(2007)
Proc. of International Workshop on Service, Security and its Data management for Ubiquitous Computing
, pp. 527-537
-
-
Mohaisen, A.1
Maeng, Y.2
Nyang, D.3
-
17
-
-
67650219656
-
-
CT Crossbow technology, wireless sensor networks
-
CT (Crossbow technology, wireless sensor networks).
-
-
-
-
19
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," In CRYPTO'92, pp. 471-486, 1992.
-
(1992)
CRYPTO'92
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
20
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks", Journal of ACM Transactions on Information and System Security, vol. 8 no. 1, pp. 41-77, 2005.
-
(2005)
Journal of ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
21
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
theory and application of cryptographic techniques, Springer-Verlag, pp
-
R. Blom, "An optimal class of symmetric key generation systems," In Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques, Springer-Verlag, pp. 335-338, 1985.
-
(1985)
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology
, pp. 335-338
-
-
Blom, R.1
-
22
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," In Proc. of 23rd Conference on Computer Communications INFOCOM, 2004.
-
(2004)
Proc. of 23rd Conference on Computer Communications INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
23
-
-
34247224664
-
Key distribution mechanisms for wireless sensor networks: A survey,
-
Technical report, Rensselaer Polytechnic Institute
-
S.A. Camtepe and B. Yener "Key distribution mechanisms for wireless sensor networks: a survey," Technical report, Rensselaer Polytechnic Institute, 2005.
-
(2005)
-
-
Camtepe, S.A.1
Yener, B.2
-
24
-
-
33745933645
-
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
-
T. Ito, H. Ohta, N. Matsuda, and T. Yoneda, "A key pre-distribution scheme for secure sensor networks using probability density function of node deployment," In Proc. of 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 69-75, 2005.
-
(2005)
Proc. of 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 69-75
-
-
Ito, T.1
Ohta, H.2
Matsuda, N.3
Yoneda, T.4
-
26
-
-
4544301464
-
Random key-assignment for secure wireless sensor networks
-
R.D. Pietro, L.V. Mancini, A. Mei, "Random key-assignment for secure wireless sensor networks," In Proc. of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 62-71, 2003.
-
(2003)
Proc. of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 62-71
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
|